Usb Threat REPORT 2020: Honeywell Industrial Cybersecurity

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 14

HONEYWELL

INDUSTRIAL
CYBERSECURITY
USB THREAT
REPORT 2020
TABLE OF
CONTENTS

2 Overview
3 Methodology
4 Key Findings
4 USB Remains a Top Threat Vector
4 USB-Borne Malware: A High-Potency Threat
5 High Concentration of USB-Specific Threats
5 USB Borne Threats Are More Dangerous Than Ever
6 Threat Patterns Appear Unique to OT
6 Are USB Borne Threats Targeting OT Systems Directly?
7 Improved Hygiene, Higher Risk
7 What’s in a Name?
7 The Tip of the USB-berg
8 Catching Missed Malware
9 Security Implications for Operators
10 Conclusion: More Research is Needed
11 Glossary

Honeywell Industrial Cybersecurity USB Threat Report, 2020 | www.honeywell.com | 1


OVERVIEW

Since publication of our original USB threat


report, there has been a general increase
in awareness around the potential cyber
risk of our friend the Universal Serial
Bus. For critical infrastructure operators
in manufacturing, aerospace, energy,
shipping, chemical, oil and gas, pulp and
paper, water and wastewater, and building
automation, removable media remains one
of the top vectors for cybersecurity threats.
Traditionally, this was because process control and critical networks are typically
well-isolated, with strong physical and logical access controls in place; as such,
attacks relying on network penetration and intrusion can be more difficult. The
remaining “low hanging fruit” for attackers is the need for file transfers into and
among industrial automation and control systems. Whether downloading patches
from a “trusted” source, sharing documents within and between process networks,
or even creating new automation programs and process files internally, file
transfers remain a necessary cog in the industrial machine.

While there’s a lot to say about network-based threats, as critical infrastructure


operators grow more sophisticated and continue to improve network security
measures, the need to move documents, patches, control programs and other files
to disconnected workstations and workgroups has increased. There has been a
definite increase in attacks that specifically target Operational Technology (OT),
as well as increased awareness of such attacks due to broad news coverage of
Industroyer, TRITON, Havex, Ekans, USBCulprit, and more. As the second most
prevalent attack vector into industrial control and automation systems, USB
devices continue to play an important role in these types of targeted attacks.

In context of these USB security concerns and continued advancements in


targeted attacks that rely on USB, researchers from Honeywell’s Industrial
Cybersecurity Global Analysis, Research, and Defense (GARD) team once again
analyzed USB usage and behavioral data collected from production sites. This
report shares findings from this new research, and identifies emerging trends from
the original Honeywell Industrial USB Threat Report. As with the first report, the
focus here remains on real threat activity observed from real industrial operations.
By analyzing real threats that have been actively detected on removable media
that were specifically destined for OT environments, we gain valuable insight
into this unique vector. Note that there are also many threats posed by malicious
USB devices other than removable media. While significant, these threats are not
covered here.

A glossary of terms used in this report is offered at the end of this document.

Honeywell Industrial Cybersecurity USB Threat Report, 2020 | www.honeywell.com | 2


METHODOLOGY
1
USB usage and behavioral data was OF THE THREATS BLOCKED
analyzed by the Cybersecurity GARD
Threat team, using a proprietary and highly
cultivated threat detection and analysis
59%
Potential to cause major
engine (the GARD Threat Engine). disruption in ICS (up from 26%)

28%
While the GARD Threat Engine is used across multiple Honeywell Industrial
Cybersecurity products and services, the data for this report was limited to those
threats detected by Honeywell’s USB security platform: Honeywell Secure Media
Exchange (SMX). SMX analyzes USB devices as they are actively used in industrial Targeted ICS (including
facilities, providing a highly focused view of critical infrastructure USB activity. ransomware) (up from 16%)

19%
All data collected from SMX, and all data from GARD is anonymous with no
personally identifiable information (PII), and only a sample set of all SMX data
collected over a 12 month period was analyzed. Due to concerns of confidentiality,
no details concerning the collection points have been provided. Designed to exploit
USB (up from 9%)
Industries represented include Oil and Gas, Energy, Food, Chemical, Shipping,
Buildings, Aerospace, Manufacturing, Pulp and Paper, and other industrial facilities.
No detailed correlation to region, nor detail by industry, has been provided here,
in an effort to further preserve data anonymity. Data was collected from over 60
15%
countries across North America, South America, Europe, the Middle East, and Are well-known threats
Asia. This sample set represents only files actively carried into production control (No Change)
facilities via USB removable storage devices, during normal day-to-day operations.
The data represents those files that were detected and blocked.

Honeywell Industrial Cybersecurity USB Threat Report, 2020 | www.honeywell.com | 3


KEY FINDINGS
2
USB REMAINS A TOP THREAT VECTOR
In the first USB Threat Report, nearly half (44%) of the locations studied had HONEYWELL
detected and blocked at least one malicious or suspicious file that represented CYBERSECURITY
a security issue. That has increased slightly over time, with 45% of locations RESEARCH REVEALS THE
blocking at least one threat. This reaffirms that USB remains a significant vector RISK OF USB THREATS
for OT threats. It is almost inevitable that, over time, some threat will find its way TO INDUSTRIALS HAS
onto USB removable media. While this may seem obvious, it is important to keep DOUBLED
this in mind when considering the types of threats detected, and the potential The increase in ransomware
impact that they could have on industrial facilitates and critical infrastructure. seen in OT indicates that
industrial corporations are
USB-BORNE MALWARE: A HIGH-POTENCY THREAT being targeted by ransomware,
As before, the volume of malware discovered on USB removable media was a small even if the ransomware itself is
fraction of the total sample size. This is likely due to the increasing storage volume not OT-specific. If we include
of removable media devices, which are now able to store enormous amounts of ransomware, the rate of
total data. The amount of malware discovered, therefore, remains statistically small threats targeting OT actually
overall. doubles from 14% to 28%.

However, the impact of the malware found increased significantly since the first
report even if the overall concentration of malware remained steady. In 2018,
14% of total threats detected were known to have been developed specifically to
target industrial systems, leveraging a specific vulnerability in industrial devices
or protocols. This dropped slightly to 11%. However, a staggering 59% of total
threats in our latest study had the ability to impact industrial control and process
automation systems, up from just 26%. This directly correlates to the increase in
ransomware, which was up from 7% to 17%. Ransomware was not considered “OT
specific” unless it specifically targeted an industrial device or protocol, and thus did
not contribute to the 11% figure. However, the increase in ransomware seen in OT
indicates that industrial corporations are being targeted by ransomware, even if the
ransomware itself is not OT-specific. If we include ransomware, the rate of threats
targeting OT actually doubles from 14% to 28%.

TROJAN VIRUS

68% 6%
OLD NEW

78%
TROJANS,
17% OTHERS 11% OTHERS VIRUSES,
3% WORMS WORMS, AND
1% WORMS ROOTKITS
1% ROOTKITS
2% ROOTKITS

3% VIRUS 6% VIRUS
5% PUA 5% PUA
4% BOTS
11% BOTS BOTS, PUAs,
2% HACKTOOLS
6% HACKTOOLS HACKTOOLS,
AND OTHERS
55% TROJAN 68% TROJAN
22%

Honeywell Industrial Cybersecurity USB Threat Report, 2020 | www.honeywell.com | 4


HIGH CONCENTRATION OF USB-SPECIFIC THREATS
An increasing number of threats found on USBs had removable media in mind. Of
the sample analyzed, 19% specifically used USB for infection or propagation. This
is more than twice as many as discovered in the initial USB Threat Report, which
found just 9% of threats were specifically crafted to leverage USB. A report from
Kaspersky Labs in 2018 showed an increase in USB-borne malware vs Web-
borne malware, based on an examination of all threats among internet-connected
computers in typical IT environments. That ratio began at 1:42, and narrowed
to 1:22 in 20181 . In comparison, Honeywell’s 2018 USB Threat Report, which
focused exclusively on the USB vector into OT, found a 1:11 ratio (9%) in 2018,
narrowing even further to 1:5 (19%) — approximately twice as prevalent as in IT.

This is an indication that USB devices are an increasingly popular vector for
malware infection and propagation, and even more so in OT versus IT. This
poses a significant threat against industrial environments, which depend
on USB removable media for regular operations. One can easily infer that
this is intentional, and that the dependence on removable media in these
environments represents a growing vulnerability against such attacks.

USB BORNE THREATS ARE MORE DANGEROUS THAN EVER


The amount of USB-borne malware that had the potential to cause a major disruption in an
industrial control system increased more than two-fold, from 26% to 59%. This includes
malware capable of creating a denial of service type attack to devices connected within
automation networks, loss of view to operations management networks, or the destruction
or disruption of any key assets. Again, this can be partly attributed to ransomware attacks,
which have again doubled year over year across industries, and have also seen increasingly
sophisticated and more targeted variants2.This puts putting USB-borne ransomware
targeting OT in line with global averages

This is no surprise with several recent media reports of ransomware attacks impacting
industrial companies. Targets have been as diverse as industrial processors of petroleum,
metals, paper and renewable energy, and have included all aspects of industrial operations
including mining, manufacturing, transportation and shipping.

https://securelist.com/usb-threats-from-malware-to-miners/87989/
1

2
https://www.zdnet.com/article/cyber-crime-ransomware-attacks-have-more-than-doubled-this-year/

Honeywell Industrial Cybersecurity USB Threat Report, 2020 | www.honeywell.com | 5


THREAT PATTERNS APPEAR UNIQUE TO OT
Comparing the threats found on USB removable media that are exclusively
entering OT facilities – the threats covered in this report – to other studies on
USB borne malware, we see distinct differences. For example, in a 2018 report
from Kaspersky researchers show that in traditional IT markets, about 9% of
USB-borne malware consisted of cryptocurrency mining3. In Honeywell’s 2018
report, we found that number to be only 4%, and it increased only marginally to
6% since then. This makes sense considering the target environments. Currency
mining is lucrative in Enterprises, where large networks and high powered
datacenters are attractive targets. OT environments, on the other hand, tend
to be isolated and often built from low-powered, legacy infrastructures. Fewer
nodes with far less compute power makes for poor mining. So what types of
threats do we see targeting OT? The largest increase is clearly in the area of
ransomware, which increased from 7% to 17%. The most prevalent threats,
however, involved RATs and backdoors, which took the lead at 34% (up from
32% in 2018) and Droppers, which tied for second at 17% (up from 12%). This
makes logical sense: in industrial environments, where network access is difficult,
gaining a foothold via USB to then establish remote access and download new
malware is a sound strategy for an attacker. While ransomware can be effective
via USB, establishing a persistent backdoor with command and control, more
coordinated attacks can be attempted in these otherwise elusive environments.

ARE USB BORNE THREATS TARGETING OT SYSTEMS DIRECTLY?


If the threats are targeted against OT, why a decrease in OT-targeted threats
(from 16% to 11%)? It’s partly to do with how industrial-targeted threats were
originally defined in the 2018 USB Threat Report: we use the term to describe
those threats designed specifically to infect or manipulate OT devices or systems
– such as Stuxnet altering process logic to cause physical damage, or TRISIS
manipulating industrial safety systems. However, that doesn’t mean that other
types of threats don’t target industrial customers or industrial environments
specifically. Again, we need to consider ransomware. Ransomware campaigns
are known to target specific geographies, demographics, and vertical markets.
Simply put, ransomware campaigns focus their efforts where victims are most
likely to pay. This is evident in recent increases in healthcare targets during the
2020 pandemic. It is likely that the increase in ransomware on removable media
in OT environments is a result of specifically targeting industrial manufacturing
and critical infrastructure, which may be seen by ransomware makers as an
increasingly lucrative segment. This certainly seems to be the case with Ekans
and other recent ransomware threats found in industrial organizations. If we
therefore expand our definition of “industrial targeted” to include ransomware,
the number of “targeted” threats against OT increases, rather than decreases:
from 16% to 28%, or more than one quarter of all detected threats.

ARE USB BORNE 16% to 11%


THREATS Attacks targeting OT
TARGETING OT? industrial assets
11
16% to 28%
28 Attacks targeting OT (not
including ransomware)

59 26% to 59%
Attacks endangering OT

3
https://securelist.com/usb-threats-from-malware-to-miners/87989/

Honeywell Industrial Cybersecurity USB Threat Report, 2020 | www.honeywell.com | 6


IMPROVED HYGIENE, HIGHER RISK
Since the initial threat report, which found an abundance of “junkware” that
indicated poor overall USB Hygiene, there was a noticeable reduction in Potentially
Unwanted Applications (PUA), non-targeted bots, adware, spyware, and hacktools
19%
TROJANS, WORMS AND
(39% down to 22%). At the same time, there was an increase in Trojans, worms,
VIRUSES UP FROM 2018
rootkits, and viruses (59% up to 78%). Simply put, threat-for-threat, the malware
present on USB removable media represents a higher risk than in the past.
With 68% of all threats classified as Trojans, and 59% specifically capable of
leveraging USB removable media for propagation, it’s clear that infections are
more about deliberate dissemination and less about accidental exposure.

WHAT’S IN A NAME?
This report focuses on threats that were successfully detected and blocked from
entering industrial facilities. However, there are numerous ways for malware POTENTIALLY
to evade detection, and there is obviously no way to quantify or analyze those UNWANTED
threats that weren’t detected. One example of evasion includes using filesystem APPLICATIONS (PUAS),
or boot sector irregularities on removable media in order to avoid detection. The NON-TARGETED-
GARD research team encountered numerous instances where media contained
BOTS, ADWARE,
irregular, illegal, unsupported, or otherwise suspicious file systems and directory
SPYWARE AND
structures. It is believed this is mostly indicative of the older technology that is
still in use in many industrial environments. Most commodity USB removable HACKTOOLS DOWN

17%
storage devices were not built to last, and older media are prone to device
errors or failures that cause these same irregularities. While there is no way
to differentiate between a legitimate irregularity and an evasion attempt, it
is worth mentioning as a potential risk. Especially where USB media is used
for critical tasks (such as backups or storage of important files), upgrading to
newer, professional grade media is recommended (see ‘Security Implications for
Operators’). While the good news is that the GARD Threat Engine ‘excludes’ these
files by default (meaning those files are assumed untrustworthy, and therefore
not allowed to be accessed), no data is currently captured for these excluded files,
preventing further analysis. Additional research is being planned in this area.

THE TIP OF THE USB-BERG


Removable media devices connected via USB remain a
clear threat, as a common and easy vector for transferring
malware. However, malicious USB devices other than
removable media and mass storage devices remain a threat.
The prevalence of Rubber Duckies, bash Bunnies, and
various incarnations of BadUSB infected devices introduces
a new type of threat against an organization’s supply chain,
where no keyboard, mouse, speaker, network adapter, or
other device can be fully trusted. While these direct USB
attacks were not covered in this report, it is important to
know that protection against such threats is possible (see
“Security Implications for Operators”). Due to the increase in
the capability and availability of malicious USB devices, the
Honeywell GARD team will be releasing a follow up report
that provides more insight into these types of threats.

Honeywell Industrial Cybersecurity USB Threat Report, 2020 | www.honeywell.com | 7


CATCHING
MISSED
MALWARE
3
Once again, we cross-checked all threats against a variety of commercial anti-
malware software solutions, in order to test the efficacy of Secure Media Exchange
and the GARD Threat Engine.

Despite the fact that many threats have been known for some time, 5% of
the total threats discovered by SMX were completely undetectable by all
commercial anti-malware solutions tested.

This is consistent with the original findings from the 2018 USB Threat Report.
Interestingly, it was noted that in several cases a particular threat was only detected
by one or two less-known software solutions. Narrowing the results to the anti-
malware vendors (based on market share) with a larger presence in OT markets,
we found that 20% of the threats analyzed went undetected, up from 11% in the
previous report. With a higher prevalence of newer threats (5% being less than one
week old), and clear indications of high-impact, targeted threats against industrials
originating form USB removable media, this remains a concern. Many industrial
organizations update anti-virus signatures less frequently, due to the limited
availability of maintenance windows where such updates can occur, which can
further increase the risk of depending solely on commercial AV scanning.

SMX improves detection performance using the GARD Threat Engine, which
includes a variety of advanced threat detection and threat intelligence technologies
and methods. While these report findings indicate that The GARD Threat Engine
is performing well, the severity of the threats discovered warrants the use of
additional security measures for true defense-in-depth (see “Security Implications
for Operators”).

Honeywell Industrial Cybersecurity USB Threat Report, 2020 | www.honeywell.com | 8


SECURITY
IMPLICATIONS
FOR
4
OPERATORS
• Evidence indicates that new threat variants are being introduced more quickly,
specifically via USB, and specifically targeting industrials. To this end, existing
controls should be re-examined, and patch cycles should be re-evaluated in an
attempt to close the Mean Time to Remediation (MTTR). External controls to
provide real-time detection and protection of key systems should be considered,
as well as integrated monitoring and incident response procedures. For more
information on closing the MTTR gap in OT environments, please refer to
SANS Whitepaper.

• USB security must include technical controls and enforcement. Relying on policy
updates or people training alone will not suffice for scalable threat prevention.
Despite the seeming widespread belief that USB drives are dangerous, and
despite the prevalence of corporate USB usage policies, the data provides ample
evidence that the threat of USB-borne malware is still increasing.

• Outbound network connectivity from process control networks should be tightly


controlled, and such restrictions should be enforced by network switches, routers
and firewalls. While USB drives are useful vectors of initial infection, the attack
types here reveal a tendency for hackers to establish remote access, and to
download additional payloads as needed.

• Ransomware is an increasingly serious threat to industrial facilities. The financial


losses of ransomware are easily thwarted by maintaining regular backups and
having a tested recovery process in place. It is never ideal to pay a ransom if
infected: it is not guaranteed that systems will be restored, and it will encourage
further ransomware campaigns to target industrial systems if they are seen as a
viable market. For further advice, as well as many ransomware identification and
decryption tools, visit https://www.nomoreransom.org

• Security upkeep remains important: Anti-virus software deployed in process


control facilities needs to be updated daily to be effective. Even then, additional
protection is recommended.

• Patching and hardening of end nodes remains necessary, despite the challenges
of patching production systems. While sophisticated and targeted attacks were
detected, many old threats were identified and could be easily mitigated by
simply keeping the infrastructure current. Hardening of OT systems is also a key
contribution to improving incident MTTR.

• Legacy USB devices pose a risk. In addition to potential vulnerability to BadUSB


or other firmware corruption, older USB devices are susceptible to errors or
corruption of the boot sectors and filesystems that can impact the reliability of
older operating systems and even introduce new vulnerabilities – putting data
and system integrity at risk. Consider upgrading removable media to newer
USB3.0 or later. For maximum protection, choose brands that offer signed and
validated firmware.

Honeywell Industrial Cybersecurity USB Threat Report, 2020 | www.honeywell.com | 9


CONCLUSION
MORE RESEARCH
IS NEEDED
5
Since the last USB Threat Report, there has been an increase “Being able to quantify actual
in the frequency and the impact of USB-borne threats. threats seen over a very specific
Early indicators that USB removable media are being used as a deliberate attack vector proves what everyone
vector into OT have been reinforced by an increased detection rate of USB-specific already suspected – that USB-
malware, as well as continued detection of malware that specifically targets borne malware continues to
industrial control / OT organizations. While the overall amount of malware remained be a major risk for industrial
relatively small, the overall exposure rate was even higher – with 45% of the SMX
operators. What’s surprising
gateways analyzed blocking at least one malicious file (up slightly from 44%). The
risk of potential disruption to ICS has also increased, from 26% to nearly 3 out of
is that we’re seeing a much
every 5 threats (59%) detected being capable of disrupting OT operations. higher density of significant
threats that are more targeted
This tells us that USB removable media is not only a real threat, but that the threat
and more dangerous. This isn’t
is increasing. However, dedicated USB security research is still uncommon, and
many organizations lack a clear strategy to improve defenses against these types a case of accidental exposure
of attacks. to viruses over USB, this is a
trend of using removable media
This report shares Honeywell USB security research findings in an effort to foster
that research, and to advance industry collaboration, in hopes of lowering cyber
as part of more deliberate
attack risk to industrial operations worldwide. and coordinated attacks.”3
– ERIC KNAPP,
DIRECTOR OF STRATEGIC INNOVATION,
HONEYWELL CONNECTED ENTERPRISE -
CYBERSECURITY.

3/5
THREATS DETECTED
WERE CAPABLE
OF DISRUPTING
OT OPERATIONS

HONEYWELL CYBERSECURITY RESEARCH REVEALS THE RISK OF USB THREATS TO


INDUSTRIALS HAS DOUBLED

Honeywell Industrial Cybersecurity USB Threat Report, 2020 | www.honeywell.com | 10


GLOSSARY
6
Adware Crackers EKANS
Adware is malware that is designed to Applications designed to bypass EKANS, also referred to as “Snake”,
display unwanted advertising material, passwords or application security is a new ransomware threat that has
often in banners or pop-ups. Adware is measures, either as benign characteristics specific to industrial
often considered a nuisance, although password recovery tools, penetration processes, and is largely considered
the interruptions caused by adware testing tools, or as attempts to to be the first ransomware variant
can become serious, especially if the bypass software licensing. built specifically to target ICS.
infection is on a critical system, by
Cryptocurrency Mining Enumerators
making it difficult to interact with
/ Crupto-mining Enumeration is the process of
the computer in a normal manner.
Cryptomining malware, or identifying valid identities of devices
APTs / Advanced Persistent Threats cryptocurrency mining malware or and users in a network; typically as an
Advanced Persistent Threat (APT) simply cryptojacking, is a relatively new initial step in a network attack process.
refers to a class of cyber threat term that refers to software programs Enumerators are applications that
designed to infiltrate a network, and malware components developed to attempt to identify valid systems and/
remain persistent through evasion take over a computer’s resources and or accounts that can then be targeted
and propagation techniques. APTs are use them for cryptocurrency mining for exploitation or compromise.
typically used to establish and maintain without a user’s explicit permission.
Flooders
an external command and control
Data Theft & Exfiltration Tools Flooders are malicious programs
channel through which the attacker
Data theft & exfiltration tools are designed to flood a network, typically
can continuously exfiltrate data.
malicious programs designed to to consume bandwidth as part
Backdoors obtain information from a target of a Denial of Service attack.
Backdoors provide unauthorized computer or network, with the intent
Hacktools
access to computer files, systems, of communicating that information
Hacktools are applications
or networks. Backdoors that provide back to an attacker located
used by penetration testers and
access over a network are often referred outside of the target network.
hackers to perform tasks typically
to as Remote Access Toolkits or RATs,
DDoS / Distributed Denial of Service associated with hacking.
although backdoors may also be
A Denial of Service attempts to
specific to local systems or applications. PUAs/Potentially Unwanted
disrupt a computer or network to
Applications
BadUSB make it unusable. A distributed
PUAs are applications that are not
An exploitation of certain USB DoS typically connects to a
typically designed to be malicious,
devices allowing the firmware to be target simultaneously from many
but that perform functions that may
overwritten by a hacker, to modify individual computers, flooding it
contradict the security interests of
how that device operates. Typically with data and making it unreachable.
users or that may operate in a manner
used to alter commercially available Distributed attacks generally use
that could present a Cybersecurity risk.
USB devices, so that they can be a network of bots (“botnets”) to
used as a cyber attack tool. coordinate the distributed attack. Ransomware
A type of malware designed to block
Bots Droppers
users from accessing or using a
Bots are malicious programs that A Dropper is a malicious program
computer system until a ransom is
act autonomously. When bots are designed to download and install other
paid. Most ransomware functions by
distributed across a network (referred malicious programs. Droppers typically
encrypting specific files, the master
to as a botnet), they are capable of don’t cause harm directly but are
boot sector, and/or the master file table
carrying out distributed, coordinated designed to ‘drop’ one or more malware
of a computer. When the ransom is paid,
actions such as Distributed Denial payloads onto a target machine.
the decryption keys may be provided
of Service (DDoS) attacks.
to allow the restoration of the infected
computer. For advice on prevention
and remediation of ransomware visit
https://www.nomoreransom.org

Honeywell Industrial Cybersecurity USB Threat Report, 2020 | www.honeywell.com | 11


Secure Media Exchange controllers. TRITON allows an attacker USB/Universal Serial Bus
Secure Media Exchange Secure Media to modify SIS behavior under certain The USB protocol defines how many
Exchange (SMX) is a commercial conditions. TRITON is considered a device types can interconnect to a
industrial Cybersecurity technical critical threat because SIS systems single computer interface, designed
solution developed by Honeywell are responsible for independently to replace many custom computer
to lower the risk of USB-borne monitoring an industrial process and peripherals with a single, common
threats. For more information, initiating a safe shutdown in advance interface. The term “USB” could refer
visit https://www.hwll.co/SMX of a hazardous state. TRITON could to any specific USB device, such
be used to trigger a shutdown, taking as a mouse, keyboard, removable
Stuxnet storage, network adapter, et. al,; a
an industrial process offline, or it
An advanced cyber attack against an USB host, such as a computer or
could potentially be used to prevent
industrial control system, consisting of
a shutdown even when a hazardous other digital system with a USB
multiple zero-day exploits used for the
state has been reached. In coordination interface; or the USB protocol itself.
delivery of malware that then targeted
with other ICS attacks, TRITON could
and infected specific industrial controls Viruses
increase the chances of causing
for the purposes of sabotaging an A computer virus refers to malicious
physical damage via a cyber attack.
automated process. Stuxnet is widely software that is capable of “infecting”
regarded as the first cyber attack to Trojan other computer programs by inserting
specifically target an industrial control A Trojan is malware that masquerades its own code to modify them.
system. Stuxnet is also significant in its as a legitimate application, in order
Worms
complexity, as it represented a massive to trick a user into executing it. The
A computer worm is a standalone
advancement in capability over any term is derived from the Trojan Horse,
malware computer program that is
previously known malware at the time. which tricked the defenders of Troy
able to self-replicate by spreading
into carrying hidden Greek troops
TRITON to and infecting other computers.
within the city walls. Unlike computer
TRITON is an industrial control system
viruses and worms, Trojans generally
attack framework capable of writing
do not operate autonomously, instead
new application memory to susceptible
relying on a user for execution.
Safety Instrumented System (SIS)

Honeywell Industrial Cybersecurity USB Threat Report, 2020 | www.honeywell.com | 12


ABOUT HONEYWELL’S GLOBAL ANALYSIS, RESEARCH
AND DEFENSE TEAM FOR OT CYBERSECURITY
Honeywell ’s Global Analysis, Research, and Defense team (GARD) is
dedicated to OT focused cybersecurity research, innovation, and integration.
As part of Honeywell Forge Cybersecurity, GARD leverages data curated
from 7 Honeywell cybersecurity research centers, and from over 5,000
deployments in over 65 countries – to provide OT threat analysis and
threat detection. Proactive threat research, mining, hunting and other
techniques can help ensure that targeted OT threats are detected early.

Honeywell Forge Cybersecurity better protects industrial assets, operations and


people from digital-age threats. With more than 15 years of OT cybersecurity
expertise and more than 50 years of industrial domain expertise, Honeywell
combines proven cybersecurity technology and industrial know-how to maximize
productivity, improve reliability and increase safety. We provide innovative
cybersecurity software, services and solutions to better protect assets, operations
and people at industrial and critical infrastructure facilities around the world. Our
state of-the-art Cybersecurity Centers of Excellence allow customers to safely
simulate, validate and accelerate their industrial Cybersecurity initiatives.

For more information


To learn more, visit www.becybersecure.com
or contact your Honeywell
Account Manager, Distributor
or System Integrator.

Honeywell Connected Enterprise


715 Peachtree Street NE
Atlanta, GA 30308 USB Threat Report 2020 | 06/20
becybersecure.com © 2020 Honeywell International Inc.

You might also like